Thông tin chung

VNU JCSCE Journal – New articles published online in June 2016 (Vol.32 No.2)

diepht

Tháng Bảy 8

Dear all,
We apologize if you received multiple copies of this message.
Please be informed that the Vol.32 No.2 of the VNU Journal of Science: Computer Science and Communication Engineering has been published. This issue is also available online in the website of the journal, http://jcsce.vnu.edu.vn/jcsce/issue/archive. We are sending you the title and abstract of the articles published in this issue in case you may be interested in.
By the way, we would like to let you know that the journal has been considered as one of the most influential journals in the IT field in Vietnam by many organizations. We look forward to your new contribution to the journal.
Thank you for your attention!
Best regards,
Prof. Nguyen Thanh Thuy
Editor Head of JCSCE
VNU Journal of Science: Computer Science and Communication Engineering
==========================================================
[1] Selection of Appropriate Number of CRs in Cooperative Spectrum Sensing over Suzuki Fading,
Thai Mai Thi Dinh, Long Thanh Nguyen, and Tuan Quoc Nguyen,
pages 1-9
Abstract:
With the rapid development of wireless communications, the radio
spectrum is becoming scarce. However, researchers have shown that many
portions of licensed spectrum unused for significant periods of
time. Recently, cognitive radio has been proposed as a very effective
mechanism which allows Cognitive Radio Users (CRs) to utilize the idle
unused licensed bands. The main challenge for a CR is to detect the
existence of Primary User (PU) in order to minimize the interference
to it. In this paper, we study the cooperative spectrum sensing under
Suzuki composite fading channel which is the mixture of Rayleigh
fading channel and Log-normal shadowing channel. Besides, we also
concentrate on finding the minimum number of CRs taking part in the
collaborative spectrum sensing to avoid the overhead to the network
but still guarantee the sensing performance through calculations and
numerical results. Our analysis and simulation results suggest that
collaboration may improve sensing performance significantly.
[2] An Efficient Implementation of Advanced Encryption Standard on the Coarse-grained Reconfigurable Architecture,
Hung Kiem Nguyen, and Tu Xuan Tran,
pages 10-22
Abstract:
The Advanced Encryption Standard (AES) is currently considered as one
of the best symmetric-key block ciphers. The hardware implementation
of the AES for hand-held mobile devices or wireless sensor network
nodes is always required to meet the strict constraints in terms of
performance, power and cost. Coarse-grained reconfigurable
architectures are recently proposed as the solution that provides high
flexibility, high performance and low power consumption for the
next-generation embedded systems. This paper presents a flexible,
high- performance implementation of the AES algorithm on a
coarse-grained reconfigurable architecture, called MUSRA (Multimedia
Specific Reconfigurable Architecture). First, we propose a
hardware-software partitioning method for mapping the AES algorithm
onto the MUSRA. Second, the parallel and pipelining techniques are
considered thoughtfully to increase total computing throughput by
efficiently utilizing the computing resources of the MUSRA. Some
optimizations at both loop transformation level and scheduling level
are performed in order to make better use of instruction-, loop- and
task- level parallelism. The proposed implementation has been
evaluated by the cycle-accurate simulator of the MUSRA. Experimental
results show that the MUSRA can be reconfigured to support both
encryption and decryption with all key lengths specified in the AES
standard. The performance of the AES algorithm on the MUSRA is better
than that of the ADRES reconfigurable processor, Xilinx Virtex-II, and
the TI C64+ DSP.
[3] Kinect based character navigation in VR Game,
Thi Ma Chau and Minh Duong Hoang,
pages 23-30
Abstract:
VR game is a hot field because it provides practical experience for
the player. However, in the game, players are usually required
attaching special equipments. Those equipments are often very
expensive. Moreover, many devices make players less flexible because
they are attached to players. VR game using Kinect is a good choice
because Kinect is affordable and not attached directly to the
player. In this paper, we propose a technique of Kinect based
character navigation in VR Game. As environment is supported by
Kinect, we implement character navigation by player’s hand
actions. Besides, we use markers to increase the effectiveness of hand
action recognition. In our experiments, character’s rotations reaches
70% in accuracy. Straight movement and turning reach 98% in accuracy.
[4] A Framework for Modeling and Modular Verifying of Component-based System Designs
Le Chi Luan, Tran Hoang Viet, and Pham Ngoc Hung,
pages 31-42
Abstract:
This paper introduces a framework for modeling and verifying safety
properties of component-based systems (CBS) by extracting their models
from designs in the form of UML 2.0 sequence diagrams. Given UML 2.0
sequence diagrams of a CBS, the framework extracts regular expressions
exactly describing behaviors of the system. From these expressions,
the proposed framework then generates accurate operation models
represented by labeled transition systems (LTSs). After that, these
models are used to modular check whether given designs satisfy
required safety properties by using the assume-guarantee reasoning
paradigm. This framework is not only useful for modeling and verifying
designs at design phase, but also for effectively rechecking the
correctness of CBS in the context of software evolution. Implemented
tools and experimental results are also presented in order to show the
feasibilities and effectiveness of the proposed framework.
[5] An Efficient Log Management Framework,
Nam Nguyen and Tran Van Cuong,
pages 43-48
Abstract:
Server monitoring is really necessary because this can help
administrators to track users’ activities in order to improve user
management ability, load balancing as well as to detect DDoS
attacks. Usually, server monitoring is based on logging. However,
logging system is always considered to be expensive in term of
storage, data collection, data searching and analysis. In this paper,
we introduce eLMS, an efficient and scalable log management system. In
our system, the log files can be collected from multiple servers,
stored in a scalable manner, appropriately indexed and fast
analysed. eLMS acts both in online and off-line modes and provides a
practical web-based monitoring interface. eLMS is based on a famous
open-source core called ELK including three main modules:
ElasticSearch, LogStash and Kibana. However, by using queue and
streaming technique instead of uploading technique used in LogStash,
eLMS is tested to be at least ten times faster than existing ELK.
[6] A Watermark Algorithm against De-Synchronization Attacks,
Luong Viet Nguyen, Trinh Nhat Tien, and Ho Van Canh,
pages 49-62
Abstract:
In this paper, a robust method to the ability of the watermark to
resist against attacks is proposed for hiding information into
images. The proposed method is blind because the original image is not
required at the decoder to recover the embedded data. The robustness
of the watermarking scheme is inspired by using a PJND (Pyramidal Just
Noticeable Difference) model and the message is inserted into these
DoG (Difference of Gaussians) [1, 2]. Our proposal takes into account
three main characteristics of Human Visual System, namely: contrast
sensitivity, luminance adaptation and contrast marking. Therefore, it
not only provides an invisible and robust watermarking but also
optimizes watermarking capacity. The performance of the proposed
technique is evaluated by a series of experiments with different input
images. In terms of transparency, besides using the subjective
experiments, eight objective metrics are calculated in comparison with
other methods such as PSNR, MSSIM, SVDm, etc. Our approach always
presents the outperform values. In terms of robustness, many kinds of
attacks from global transformation (rotation, scaling, etc) to local
transformation (stirmark, checkmark benchmarks, de-synchronization
attacks) are implemented. Many image processing tools are applied to
simulate the attacks such as Print-Screen, Using Photo editing
software, Camcorder, Print-Scan, etc. The experimental results show an
outstanding robustness in resisting these attacks.
[7] Target tracking solution for multi-sensor data fusion in wireless sensor networks,
Duong Viet Huy and Nguyen Dinh Viet,
pages 63-71
Abstract:
Wireless sensor networks are often composed of many sensor nodes, they
are powered by batteries with limited capacity. The sensor nodes are
randomly scattered within in the ranger monitoring and send – receiver
data using radio waves. Many research projects had demonstrated the
consumption of battery power by the data transceiver occupy large
compared to the calculation on the sensor node. In this paper, we
propose energy saving solutions of nodes in a cluster by only choosing
some nodes in the cluster to track the target and transmit this data
to cluster head nodes. We based on the location of the sensor nodes in
the cluster compare with the location of target and cluster head nodes
to perform this selection. The effectiveness of the proposed solutions
will be evaluated based on the number of sensor nodes are selected
considering the number of nodes in the cluster, this is the base for
the effectiveness of energy saving as well as the cluster nodes.

© VNU-UET-Faculty of Information Technology. All rights reserved.